IoT messaging broker

Extend business applications through IoT data stream orchestration to translate, route and govern messaging between disparate and legacy technology

IoT messaging brokers are critical to enabling IoT data stream integration. Connecting machines to systems and systems to people requires a methodical, purposeful approach to data management. As machines and devices generate more data, it is essential to secure and unify this information for organizations to gain value from their IoT platform investments and maintain a competitive edge.

What is an IoT messaging broker?

The IoT messaging broker is a processing engine for streaming events and commands across devices, systems and processes using workflow and analytics. Advanced messaging capabilities are key to all IoT ecosystems, especially those that impact disparate source and destination systems.

OpenText Unified Messaging for IoT overview

With any-to-any communication protocol support from MQTT to FTP, OpenText™ Unified Messaging for IoT enables enterprises to rapidly, securely and flexibly integrate structured and unstructured data. This eliminates the cost and complexity of changing document types, data formats and protocols and removes the need to create and syndicate integrations for machine-to-machine and application-to application scenarios. With Unified Messaging for IoT, enterprises no longer need to create composite applications or manage disparate provisioning, authentication and authorization processes across complex ecosystems.

Unified Messaging for IoT features an event data hub and processing engine that receives multiple streams of data with different protocols, persists the data, applies business logic and automatically routes it to the right recipient or application. As an IoT deployment grows, or new services requiring access to the IoT-sourced data are offered, organizations can leverage Unified Messaging to publish data into a public queue where new entities can subscribe.

OpenText Unified Messaging for IoT features

Identity-centric approach

Enables enterprises to integrate legacy and modern messaging technologies and gather and track IoT data, avoiding the operational integration nightmare commonly associated with piece-meal IoT systems.

Routing and orchestration

Transfers, routes, prioritizes and orchestrates messages with a robust enterprise service bus.

Any-to-any transformation

Transforms message payloads across document types, data formats and protocols.

Enterprise adapters

Ingests and publishes data from/to third-party data stores and enterprise systems.

Batch messaging

Batch processes multiple messages (zip, flat file, XML) into a single scheduled delivery with configurable delivery intervals and reporting capabilities on job execution. Custom batching modules can also be created with simple configuration.

Syndication

Synchronizes and consolidates information across applications and sources.

OpenText Unified Messaging for IoT benefits

Streamline implementation and integration of legacy technology

Introduce an internet-scale stream processing engine for sending events and commands across legacy industrial devices, systems and processes using workflow and stream analytics.

Bridge the integration of legacy and modern messaging technologies

Broker between protocols, such as MQTT, JMS, STOMP, and support legacy/proprietary device communication. Perform custom application protocol creation on top of any IP stack-based protocol, such as UDP, TCP, HTTP and FTP.

Identify and mitigate data or broadcast storms

Manage customer and application-specific traffic using dedicated queues to isolate the customer traffic, effectively manage customer-specific load and prevent erratic volumes from one customer impacting other customers.

Increase auditability and compliance

Use the operations console to view messages, metadata, routing and control information (before and after transformations), command acknowledgments, detailed timestamps for all processing steps and root cause and traces of failed messages.

Enabling and securing the digital supply chain using IAM and IoT report

Secure the Internet of Things with identity and access management

Use identity and access management to establish the “Identity of Things” and secure end-to-end supply chain operations.

Get the report

Contact us

Blogs

Downloads

Related solutions